Commit graph

21 commits

Author SHA1 Message Date
taca
443e9345e5 net/bind911: update to 9.11.13
Update bind911 to 9.11.3.  It includes fix for CVS-2019-6477.


	--- 9.11.13 released ---

5315.	[bug]		Apply the inital RRSIG expiration spread fixed
			to all dynamically created records in the zone
			including NSEC3. Also fix the signature clusters
			when the server has been offline for prolonged
			period of times. [GL #1256]

5314.	[func]		Added a new statistics variable "tcp-highwater"
			that reports the maximum number of simultaneous TCP
			clients BIND has handled while running. [GL #1206]

5313.	[bug]		The default GeoIP2 database location did not match
			the ARM.  'named -V' now reports the default
			location. [GL #1301]

5310.	[bug]		TCP failures were affecting EDNS statistics. [GL #1059]

5309.	[bug]		"geoip-use-ecs yes;" was not working for GeoIP2.
			[GL #1275]

5308.	[bug]		Don't log DNS_R_UNCHANGED from sync_secure_journal()
			at ERROR level in receive_secure_serial(). [GL #1288]

5307.	[bug]		Fix hang when named-compilezone output is sent to pipe.
			Thanks to Tony Finch. [GL !2481]

5306.	[security]	Set a limit on the number of concurrently served
			pipelined TCP queries. (CVE-2019-6477) [GL #1264]

5302.	[bug]		Fix checking that "dnstap-output" is defined when
			"dnstap" is specified in a view. [GL #1281]

5301.	[bug]		Detect partial prefixes / incomplete IPv4 address in
			acls. [GL #1143]
2019-11-21 05:38:21 +00:00
rillig
eb3c2b436e net: align variable assignments
pkglint -Wall -F --only aligned --only indent -r

No manual corrections.
2019-11-03 11:45:28 +00:00
taca
a83e0161f9 net/bind911: update to 9.11.12
Update bind911 to 9.11.12 (BIND 9.11.12).  This is not security release.

	--- 9.11.12 released ---

5296.	[bug]		Address various issues reported by cppcheck. [GL !2421]

5294.	[func]		Fallback to ACE name on output in locale, which does not
			support converting it to unicode.  [GL #846]

5293.	[bug]		On Windows, named crashed upon any attempt to fetch XML
			statistics from it. [GL #1245]

5292.	[bug]		Queue 'rndc nsec3param' requests while signing inline
			zone changes. [GL #1205]
2019-10-17 00:48:31 +00:00
taca
5bb6dd8bac net/bind911: update to 9.11.10
Update bind911 to 9.11.10 (BIND 9.11.10).

	--- 9.11.10 released ---

5275.	[bug]		Mark DS records included in referral messages
			with trust level "pending" so that they can be
			validated and cached immediately, with no need to
			re-query. [GL #964]

5273.	[bug]		Check that bits [64..71] of a dns64 prefix are zero.
			[GL #1159]

5269.	[port]		cygwin: can return ETIMEDOUT on connect() with a
			non-blocking socket. [GL #1133]

5268.	[bug]		named could crash during configuration if
			configured to use "geoip continent" ACLs with
			legacy GeoIP. [GL #1163]

5266.	[bug]		named-checkconf failed to report dnstap-output
			missing from named.conf when dnstap was specified.
			[GL #1136]

5265.	[bug]		DNS64 and RPZ nodata (CNAME *.) rules interacted badly
			[GL #1106]

5264.	[func]		New DNS Cookie algorithm - siphash24 - has been added to
			BIND 9. [GL #605]
2019-09-18 14:32:10 +00:00
wiz
84e123ddd2 Bump PKGREVISIONs for perl 5.30.0 2019-08-11 13:17:48 +00:00
taca
20d02c760e net/bind911: update to 9.11.9.
Update bind911 to 9.11.9.

	--- 9.11.9 released ---

5260.	[bug]		dnstap-read was producing malformed output for large
			packets. [GL #1093]

5258.	[func]		Added support for the GeoIP2 API from MaxMind,
			when BIND is compiled using "configure --with-geoip2".
			The legacy GeoIP API can be enabled by using
			"configure --with-geoip" instead. These options
			cannot be used together.

			Certain geoip ACL settings that were available with
			legacy GeoIP are not available when using GeoIP2.
			See the ARM for details. [GL #182]

5257.	[bug]		Some statistics data was not being displayed.
			Add shading to the zone tables. [GL #1030]

5256.	[bug]		Ensure that glue records are included in root
			priming responses if "minimal-responses" is not
			set to "yes". [GL #1092]

5255.	[bug]		Errors encountered while reloading inline-signing
			zones could be ignored, causing the zone content to
			be left in an incompletely updated state rather than
			reverted. [GL #1109]

5253.	[port]		Support platforms that don't define ULLONG_MAX.
			[GL #1098]

5249.	[bug]		Fix a possible underflow in recursion clients
			statistics when hitting recursive clients
			soft quota. [GL #1067]
2019-07-18 03:02:52 +00:00
jperkin
da6c4086ab bind*: Remove privileges from SMF method script.
This inadvertently opened up the named process to more privileges than
necessary and could be considered a security risk.  This may affect chroot
support, adding back in support for that will need to be done carefully.

Bump PKGREVISIONs.
2019-06-28 17:01:30 +00:00
jperkin
ebc81c735d bind*: Move MESSAGE to MESSAGE.rcd, they are rc.d specific. 2019-06-20 12:26:33 +00:00
taca
24df3a5811 net/bind911: update to 9.11.8
Update bind911 to 9.11.8 (BIND 9.11.8).

	--- 9.11.8 released ---

5244.	[security]	Fixed a race condition in dns_dispatch_getnext()
			that could cause an assertion failure if a
			significant number of incoming packets were
			rejected. (CVE-2019-6471) [GL #942]

5241.	[bug]		Fix Ed448 private and public key ASN.1 prefix blobs.
			[GL #225]

5237.	[bug]		Recurse to find the root server list with 'dig +trace'.
			[GL #1028]
2019-06-20 02:13:58 +00:00
jperkin
19304ee7b8 bind*: Fix a couple of issues in the SMF method.
Fix a typo in the configuration_file arguments, joyent/pkgsrc#189.
Ensure the /var/run/named directory has the correct permissions.
2019-06-19 10:58:48 +00:00
taca
70fa58b77e net/bind911: update to 9.11.7
Update bind911 to 9.11.7, this is maintenance releases.

--- 9.11.7 released ---

5233.	[bug]		Negative trust anchors did not work with "forward only;"
			to validating resolvers. [GL #997]
5232.	[bug]		Fix a high-load race/crash in isc_socket_cancel().
			[GL #834]
5231.	[protocol]	Add support for displaying CLIENT-TAG and SERVER-TAG.
			[GL #960]
5229.	[protocol]	Enforce known SSHFP fingerprint lengths. [GL #852]
5228.	[cleanup]	If trusted-keys and managed-keys are configured
			simultaneously for the same name, the key cannot
			be rolled automatically. This configuration now
			logs a warning. [GL #868]
5224.	[bug]		Only test provide-ixfr on TCP streams. [GL #991]
5222.	[bug]		'delv -t ANY' could leak memory. [GL #983]
5221.	[test]		Enable parallel execution of system tests on
			Windows. [GL !4101]
5218.	[bug]		Conditionally include <dlfcn.h>. [GL #995]
5214.	[bug]		win32: named now removes its lock file upon shutdown.
			[GL #979]
5213.	[bug]		win32: Eliminated a race which allowed named.exe running
			as a service to be killed prematurely during shutdown.
			[GL #978]
5210.	[bug]		When dnstap is enabled and recursion is not
			available, incoming queries are now logged
			as "auth". Previously, this depended on whether
			recursion was requested by the client, not on
			whether recursion was available. [GL #963]
5209.	[bug]		When update-check-ksk is true, add_sigs was not
			considering offline keys, leaving record sets signed
			with the incorrect type key. [GL #763]
5208.	[test]		Run valid rdata wire encodings through totext+fromtext
			and tofmttext+fromtext methods to check these methods.
			[GL #899]
5207.	[test]		Check delv and dig TTL values. [GL #965]
5205.	[bug]		Enforce that a DS hash exists. [GL #899]
5204.	[test]		Check that dns_rdata_fromtext() produces a record that
			will be accepted by dns_rdata_fromwire(). [GL #852]
5203.	[bug]		Enforce whether key rdata exists or not in KEY,
			DNSKEY, CDNSKEY and RKEY. [GL #899]
5197.	[bug]		dig could die in best effort mode on multiple SIG(0)
			records. Similarly on multiple OPT and multiple TSIG
			records. [GL #920]
5194.	[bug]		Enforce non empty ZOMEMD hash. [GL #899]
5193.	[bug]		EID and NIMLOC failed to do multi-line output
			correctly. [GL #899]
5192.	[bug]		configure --fips-mode failed. [GL #946]
5191.	[port]		Darwin: dlzexternal/driver.so was not building.
			[GL #948]
5189.	[cleanup]	Remove revoked root DNSKEY from bind.keys. [GL #945]
5187.	[test]		Set time zone before running any tests in dnstap_test.
			[GL #940]
5185.	[bug]		PKCS11 build could fail if ECDSA is not supported.
			[GL #935]
5184.	[bug]		Missing unlocks in sdlz.c. [GL #936]
5182.	[bug]		Fix a high-load race/crash in handling of
			isc_socket_close() in resolver. [GL #834]
5180.	[bug]		delv now honors the operating system's preferred
			ephemeral port range. [GL #925]
5179.	[cleanup]	Replace some vague type declarations with the more
			specific dns_secalg_t and dns_dsdigest_t.
			Thanks to Tony Finch. [GL !1498]
5178.	[bug]		Handle EDQUOT (disk quota) and ENOSPC (disk full)
			errors when writing files. [GL #902]
5176.	[tests]		Remove a dependency on libxml in statschannel system
			test. [GL #926]
5175.	[bug]		Fixed a problem with file input in dnssec-keymgr,
			dnssec-coverage and dnssec-checkds when using
			python3. [GL #882]
5174.	[doc]		Tidy dnssec-keygen manual. [GL !1557]
5172.	[bug]		nsupdate now honors the operating system's preferred
			ephemeral port range. [GL #905]
5170.	[test]		Added --with-dlz-filesystem to feature-test. [GL !1587]
5168.	[test]		Do not crash on shutdown when RPZ fails to load.  Also,
			keep previous version of the database if RPZ fails to
			load. [GL #813]
5167.	[bug]		nxdomain-redirect could sometimes lookup the wrong
			redirect name. [GL #892]
2019-05-20 16:03:55 +00:00
taca
3f12dc03ae net/bind911: update to 9.11.6pl1
Update bind911 to 9.11.5pl4 (BIND 9.11.5-P4).

Fix security problem CVE-2018-5743 and overhaul pkgsrc.  Now no need
to change namedb is permission under NetBSD.

* Update note about required directories.
* Drop pkg-config from USE_TOOLS.
* Drop none existing configure arguments and PKG_OPTIONS:
	- fetchlimit
	- sit

	--- 9.11.6-P1 released ---

5200.	[security]	tcp-clients settings could be exceeded in some cases,
			which could lead to exhaustion of file descriptors.
			(CVE-2018-5743) [GL #615]
2019-04-30 02:51:38 +00:00
jperkin
4a64ebb8cb bind*: Ensure named directory is created on SunOS. 2019-03-01 21:46:50 +00:00
taca
4c15df2cde net/bind911: update to 9.11.5pl4
Update bind911 to 9.11.5pl4 (BIND 9.11.5-P4).

	--- 9.11.5-P4 released ---

	--- 9.11.5-P3 released (withdrawn) ---

5141.	[security]	Zone transfer controls for writable DLZ zones were
			not effective as the allowzonexfr method was not being
			called for such zones. (CVE-2019-6465) [GL #790]

	--- 9.11.5-P2 released (withdrawn) ---

5118.	[security]	Named could crash if it is managing a key with
			`managed-keys` and the authoritative zone is rolling
			the key to an unsupported algorithm. (CVE-2018-5745)
			[GL #780]

5110.	[security]	Named leaked memory if there were multiple Key Tag
			EDNS options present. (CVE-2018-5744) [GL #772]
2019-02-22 01:22:38 +00:00
taca
4825d2b404 net/bind911: update to 9.11.5pl1
Update bind911 to 9.11.5pl1 (BIND 9.11.5-P1).

	--- 9.11.5-P1 released ---

5108.	[bug]		Named could fail to determine bottom of zone when
			removing out of date keys leading to invalid NSEC
			and NSEC3 records being added to the zone. [GL #771]
2018-12-15 16:39:07 +00:00
jperkin
be17b5228f bind911: Fix build on SunOS. 2018-10-24 11:27:28 +00:00
taca
7c48796a65 net/bind911: update to 9.11.5
--- 9.11.5 released ---

	--- 9.11.5rc1 released ---

5038.	[bug]		Chaosnet addresses were compared incorrectly.
			[GL #562]

5034.	[bug]		A race between threads could prevent zone maintenance
			scheduled immediately after zone load from being
			performed. [GL #542]

5033.	[bug]		When adding NTAs to multiple views using "rndc nta",
			the text returned via rndc was incorrectly terminated
			after the first line, making it look as if only one
			NTA had been added. Also, it was not possible to
			differentiate between views with the same name but
			different classes; this has been corrected with the
			addition of a "-class" option. [GL #105]

5032.	[func]		Add krb5-selfsub and ms-selfsub update policy rules.
			[GL #511]

5030.	[bug]		Align CMSG buffers to a 64-bit boundary, fixes crash
			on architectures with strict alignment. [GL #521]

5028.	[bug]		Spread the initial RRSIG expiration times over the
			entire working sig-validity-interval when signing a
			zone in named to even out re-signing and transfer
			loads. [GL #418]

5026.	[bug]		rndc reconfig should not touch already loaded zones.
			[GL #276]

5022.	[doc]		Update ms-self, ms-subdomain, krb5-self, and
			krb5-subdomain documentation. [GL !708]

5021.	[bug]		dig returned a non-zero exit code when it received a
			reply over TCP after a retry. [GL #487]

5019.	[cleanup]	A message is now logged when ixfr-from-differences is
			set at zone level for an inline-signed zone. [GL #470]

5018.	[bug]		Fix incorrect sizeof arguments in lib/isc/pk11.c.
			[GL !588]

5017.	[bug]		lib/isc/pk11.c failed to unlink the session before
			releasing the lock which is unsafe. [GL !589]

5016.	[bug]		Named could assert with overlapping filter-aaaa and
			dns64 acls. [GL #445]

5015.	[bug]		Reloading all zones caused zone maintenance to cease
			for inline-signed zones. [GL #435]

5014.	[bug]		Signatures loaded from the journal for the signed
			version of an inline-signed zone were not scheduled for
			refresh. [GL #482]

5012.	[bug]		Fix lock order reversal in pk11_initialize. [GL !590]

5009.	[bug]		Upon an OpenSSL failure, the first error in the OpenSSL
			error queue was not logged. [GL #476]

5008.	[bug]		"rndc signing -nsec3param ..." requests were silently
			ignored for zones which were not yet loaded or
			transferred. [GL #468]

5007.	[cleanup]	Replace custom ISC boolean and integer data types
			with C99 stdint.h and stdbool.h types. [GL #9]

5005.	[bug]		dnssec-verify, and dnssec-signzone at the verification
			step, failed on some validly signed zones. [GL #442]

5004.	[bug]		'rndc reconfig' could cause inline zones to stop
			re-signing. [GL #439]

5003.	[bug]		dns_acl_isinsecure did not handle geoip elements.
			[GL #406]

5002.	[bug]		mdig: Handle malformed +ednsopt option, support 100
			+ednsopt options per query rather than 100 total and
			address memory leaks if +ednsopt was specified.
			[GL #410]

5001.	[bug]		Fix refcount errors on error paths. [GL !563]

4996.	[bug]		dig: Handle malformed +ednsopt option. [GL #403]

4995.	[test]		Add tests for "tcp-self" update policy. [GL !282]

4994.	[bug]		Trust anchor telemetry queries were not being sent
			upstream for locally served zones. [GL #392]

4992.	[bug]		The wrong address was being logged for trust anchor
			telemetry queries. [GL #379]

4990.	[bug]		Prevent a possible NULL reference in pkcs11-keygen.
			[GL #401]
2018-10-21 15:51:14 +00:00
wiz
3ce3ed950b bind91?: fix whitespace 2018-09-27 04:24:18 +00:00
taca
35b6578d3a net/bind911: update to 9.11.4pl2
Update bind911 to 9.11.4pl2 (BIND 9.11.4-P2).

	--- 9.11.4-P2 released ---

5022.	[doc]		Update ms-self, ms-subdomain, krb5-self, and
			krb5-subdomain documentation. [GL !708]

5015.	[bug]		Reloading all zones caused zone maintenance to cease
			for inline-signed zones. [GL #435]

5014.	[bug]		Signatures loaded from the journal for the signed
			version of an inline-signed zone were not scheduled for
			refresh. [GL #482]
2018-09-20 10:01:36 +00:00
jklos
49b3a63fbe Disable atomic operations on VAX and m68k in addition to mipsel so BIND
compiles on these architectures.
2018-09-13 02:57:43 +00:00
taca
c84f75c1b5 net/bind911 Add BIND 9.11 package
Add bind9.11.4pl1 (BIND 9.11.4-P1) package.

Note: named(8) requires writable permission to current directory when
start up or the directory specified by "directory" in options statement.


BIND, the Berkeley Internet Name Daemon, version 9 is a major rewrite
of nearly all aspects of the underlying BIND architecture.  Some
of the important features of BIND-9 are:

	- DNS Security
	- IP version 6
	- DNS Protocol Enhancements
	- Views
	- Multiprocessor Support
	- Improved Portability Architecture
	- Full NSEC3 support
	- Automatic zone re-signing
	- New update-policy methods tcp-self and 6to4-self

This package contains the BIND 9.11 release.

	- Catalog Zones, a new method for provisioning servers
	- "dnstap", a fast and flexible method of capturing and logging
	  DNS traffic.
	- "dyndb", a new API for loading zone data from an external database
	- dnssec-keymgr, a new key mainenance utility
	- mdig, an alternate version of dig utility
	- And more...
2018-09-09 13:11:38 +00:00